The Community for Technology Leaders
Green Image
Issue No. 02 - March/April (2012 vol. 10)
ISSN: 1540-7993
pp: 67-70
Toby Murray , NICTA
Gerwin Klein , NICTA
The time has arrived for truly trustworthy systems, backed by machine-checked proofs of security and reliability. Research demonstrates that formal whole-system analysis that applies to the C and binary implementation level is feasible, including proofs of integrity, authority confinement, confidentiality, and worst-case execution time. Because these proofs build on previous results, they become easier each year. However, they do have some limitations.
trustworthy systems, verification and analysis, seL4 microkernel, integrity, confidentiality, worst-case execution time, safety, security, computer security, functional correctness, authority confinement, noninterference

G. Klein, G. Heiser and T. Murray, "It's Time for Trustworthy Systems," in IEEE Security & Privacy, vol. 10, no. , pp. 67-70, 2012.
89 ms
(Ver 3.3 (11022016))